Details
-
New Feature
-
Status: Stalled (View Workflow)
-
Critical
-
Resolution: Unresolved
Description
Summary:
Implement a way to ensure that a user can not get access to a particular resource.
DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked.
For example:
GRANT SELECT on *.* to alice; |
DENY SELECT on db.secret_table to alice; |
alice will not be able to select from secret_table.
Syntax:
DENY <privilege-list> ON <object-list> TO <user-or-role> |
|
REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> |
User cases
https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views)
https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views)
https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views)
Details:
- Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in show databases.
- DENY works on roles (as well as PUBLIC when it is implemented)
- Enabling a role activates that role's denies as well.
- Denies will be visible in SHOW GRANTS [FOR] if:
- User has read or write access to mysql database.
User has read or write access to corresponding mysql privilege table.(TODO for as a separate MDEV for SHOW GRANTS)
Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES
- Introduce a form of SUPER privilege, say IGNORE_DENIES, to allow a "superuser" to ignore denies (this is compatible with SQL Server DENY behavior)
Compatiblity with other databases (Potential future work)
SQL Server
- Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via SQL_MODE=MSSQL) GRANT can also cancel a DENY.
- An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility.
MySQL
- MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation.
- To allow MySQL compatibility, a possible extension in the future is: @@partial_revokes=1 -> REVOKE also works as DENY.
Implementation details:
- Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer:
- Does this user have denies for databases? (if global privileges met all required access bits).
- Does this user have denies for tables in a particular database (if database level privileges met all required access bits).
- Does this user have denies on table columns for a particular table (if table level privileges met all required access bits).
Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column?
Milestones (each milestone includes test cases showcasing functionality):
- Grammar
- Global denies
- Database denies
- Table level denies
- Column level denies
- Stored procedure denies
- Information schema tables
Attachments
Issue Links
- is blocked by
-
MDEV-29458 Role grant commands do not propagate all grants
-
- Closed
-
-
MDEV-29465 Inherited columns privs for roles wrongly set mysql.tables_priv column
-
- Closed
-
-
MDEV-29509 execute granted indirectly (via roles) doesn't always work
-
- Closed
-
- links to
Activity
Field | Original Value | New Value |
---|---|---|
Summary | MariaDB privilege system does not have backlist for access control | MariaDB privilege system does not have blacklist for access control |
Summary | MariaDB privilege system does not have blacklist for access control | Blacklist for access control a.k.a. "negative grants" |
Description | Currently, MariaDB privilege system only perform whiltelist check for access control to certain database, table and column. This makes it difficult if we need to block access to certain database/table/column while allow for all others. |
Currently, MariaDB privilege system only perform whiltelist check for access control to certain database, table and column. This makes it difficult if we need to block access to certain database/table/column while allow for all others.
---- A good solution would be to allow to {{REVOKE}} anything that a user is able to do — not only exactly those grants that were granted to a user, but also a suubset. Like {code:sql} GRANT SELECT ON some_database.* TO a_user@%; REVOKE SELECT ON some_database.secret_table FROM a_user@%; {code} |
Description |
Currently, MariaDB privilege system only perform whiltelist check for access control to certain database, table and column. This makes it difficult if we need to block access to certain database/table/column while allow for all others.
---- A good solution would be to allow to {{REVOKE}} anything that a user is able to do — not only exactly those grants that were granted to a user, but also a suubset. Like {code:sql} GRANT SELECT ON some_database.* TO a_user@%; REVOKE SELECT ON some_database.secret_table FROM a_user@%; {code} |
Currently, MariaDB privilege system only perform whiltelist check for access control to certain database, table and column. This makes it difficult if we need to block access to certain database/table/column while allow for all others.
---- A good solution would be to allow to {{REVOKE}} anything that a user is able to do — not only exactly those grants that were granted to a user, but also a subset. Like {code:sql} GRANT SELECT ON some_database.* TO a_user@%; REVOKE SELECT ON some_database.secret_table FROM a_user@%; {code} |
Labels | gsoc18 |
Link | This issue is part of PT-68 [ PT-68 ] |
Fix Version/s | 10.4 [ 22408 ] |
Description |
Currently, MariaDB privilege system only perform whiltelist check for access control to certain database, table and column. This makes it difficult if we need to block access to certain database/table/column while allow for all others.
---- A good solution would be to allow to {{REVOKE}} anything that a user is able to do — not only exactly those grants that were granted to a user, but also a subset. Like {code:sql} GRANT SELECT ON some_database.* TO a_user@%; REVOKE SELECT ON some_database.secret_table FROM a_user@%; {code} |
Currently, MariaDB privilege system only perform whiltelist check for access control to certain database, table and column. This makes it difficult if we need to block access to certain database/table/column while allow for all others.
--- A good solution would be to allow to {{REVOKE}} anything that a user is able to do — not only exactly those grants that were granted to a user, but also a subset. Like {code:sql} GRANT SELECT ON some_database.* TO a_user@%; REVOKE SELECT ON some_database.secret_table FROM a_user@%; {code} |
Assignee | Vicentiu Ciorbaru [ cvicentiu ] |
Status | Open [ 1 ] | In Progress [ 3 ] |
Assignee | Vicentiu Ciorbaru [ cvicentiu ] | Rutuja Surve [ rutuja ] |
Remote Link | This issue links to " Proposal for Negative Grants Project (Web Link)" [ 28500 ] |
Link | This issue is part of PT-73 [ PT-73 ] |
Link | This issue is part of PT-73 [ PT-73 ] |
Epic Link | PT-73 [ 68549 ] |
Priority | Major [ 3 ] | Critical [ 2 ] |
Rank | Ranked higher |
Team | Server DEV | Foundation |
Assignee | Rutuja Surve [ rutuja ] | Vicentiu Ciorbaru [ cvicentiu ] |
Attachment | Rutuja-Reverse-Priv-Dec-18.pdf [ 47132 ] |
Labels | gsoc18 | gsoc18 gsoc19 |
Labels | gsoc18 gsoc19 | gsoc18 |
Fix Version/s | 10.5 [ 23123 ] | |
Fix Version/s | 10.4 [ 22408 ] |
Epic Link | PT-73 [ 68549 ] |
Status | In Progress [ 3 ] | Stalled [ 10000 ] |
Fix Version/s | 10.5 [ 23123 ] |
Link | This issue relates to DBAAS-6361 [ DBAAS-6361 ] |
Fix Version/s | 10.8 [ 26121 ] |
Description |
Currently, MariaDB privilege system only perform whiltelist check for access control to certain database, table and column. This makes it difficult if we need to block access to certain database/table/column while allow for all others.
--- A good solution would be to allow to {{REVOKE}} anything that a user is able to do — not only exactly those grants that were granted to a user, but also a subset. Like {code:sql} GRANT SELECT ON some_database.* TO a_user@%; REVOKE SELECT ON some_database.secret_table FROM a_user@%; {code} |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: * User has read or write access to {{mysql}} database. * User has read or write access to corresponding {{mysql}} privilege table. * User has some form of SUPER privilege. (SAY IGNORE DENIES) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
Description |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: * User has read or write access to {{mysql}} database. * User has read or write access to corresponding {{mysql}} privilege table. * User has some form of SUPER privilege. (SAY IGNORE DENIES) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: * User has read or write access to {{mysql}} database. * User has read or write access to corresponding {{mysql}} privilege table. * User has some form of SUPER privilege. (say IGNORE DENIES) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
Description |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: * User has read or write access to {{mysql}} database. * User has read or write access to corresponding {{mysql}} privilege table. * User has some form of SUPER privilege. (say IGNORE DENIES) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: ** User has read or write access to {{mysql}} database. ** User has read or write access to corresponding {{mysql}} privilege table. ** User has some form of SUPER privilege. (say IGNORE DENIES) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
Description |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: ** User has read or write access to {{mysql}} database. ** User has read or write access to corresponding {{mysql}} privilege table. ** User has some form of SUPER privilege. (say IGNORE DENIES) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: ** User has read or write access to {{mysql}} database. ** -User has read or write access to corresponding {{mysql}} privilege table.- (TODO for as a separate MDEV for SHOW GRANTS) ** User has some form of SUPER privilege. (say IGNORE DENIES) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
Description |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: ** User has read or write access to {{mysql}} database. ** -User has read or write access to corresponding {{mysql}} privilege table.- (TODO for as a separate MDEV for SHOW GRANTS) ** User has some form of SUPER privilege. (say IGNORE DENIES) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: ** User has read or write access to {{mysql}} database. ** -User has read or write access to corresponding {{mysql}} privilege table.- (TODO for as a separate MDEV for SHOW GRANTS) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES # Introduce a form of SUPER privilege, say IGNORE_DENIES, to allow a "superuser" to ignore denies. h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
Description |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: ** User has read or write access to {{mysql}} database. ** -User has read or write access to corresponding {{mysql}} privilege table.- (TODO for as a separate MDEV for SHOW GRANTS) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES # Introduce a form of SUPER privilege, say IGNORE_DENIES, to allow a "superuser" to ignore denies. h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: ** User has read or write access to {{mysql}} database. ** -User has read or write access to corresponding {{mysql}} privilege table.- (TODO for as a separate MDEV for SHOW GRANTS) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES # Introduce a form of SUPER privilege, say IGNORE_DENIES, to allow a "superuser" to ignore denies (this is compatible with SQL Server DENY behavior) h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
Link | This issue relates to MENT-593 [ MENT-593 ] |
Status | Stalled [ 10000 ] | In Progress [ 3 ] |
Workflow | MariaDB v3 [ 83893 ] | MariaDB v4 [ 131822 ] |
Fix Version/s | 10.9 [ 26905 ] | |
Fix Version/s | 10.8 [ 26121 ] |
Link | This issue relates to MENT-1352 [ MENT-1352 ] |
Link | This issue relates to XPT-194 [ XPT-194 ] |
Status | In Progress [ 3 ] | Stalled [ 10000 ] |
Status | Stalled [ 10000 ] | In Progress [ 3 ] |
Fix Version/s | 10.10 [ 27530 ] | |
Fix Version/s | 10.9 [ 26905 ] |
Link | This issue blocks DBAAS-6361 [ DBAAS-6361 ] |
Link | This issue relates to DBAAS-6361 [ DBAAS-6361 ] |
Link | This issue causes DBAAS-9687 [ DBAAS-9687 ] |
Link | This issue blocks MENT-1348 [ MENT-1348 ] |
Status | In Progress [ 3 ] | Stalled [ 10000 ] |
Fix Version/s | 10.11 [ 27614 ] | |
Fix Version/s | 10.10 [ 27530 ] |
Description |
h2. Summary:
Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS \[FOR\]}} if: ** User has read or write access to {{mysql}} database. ** -User has read or write access to corresponding {{mysql}} privilege table.- (TODO for as a separate MDEV for SHOW GRANTS) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES # Introduce a form of SUPER privilege, say IGNORE_DENIES, to allow a "superuser" to ignore denies (this is compatible with SQL Server DENY behavior) h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} -> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
h2. Summary: Implement a way to ensure that a user can not get access to a particular resource. DENY will function as a separate set of rules for access control. If any resource (global, database, table, column, procedure, function, etc.) has a deny on one particular privilege, it is impossible to gain that privilege unless the DENY is revoked. For example: {code:sql} GRANT SELECT on *.* to alice; DENY SELECT on db.secret_table to alice; {code} {{alice}} will not be able to select from secret\_table. h2. Syntax: {code:sql} DENY <privilege-list> ON <object-list> TO <user-or-role> REVOKE DENY <privilege-list> ON <object-list> FROM <user-or-role> {code} h3. User cases https://stackoverflow.com/questions/6288554/mysql-grant-all-privileges-to-database-except-one-table (32k views) https://dba.stackexchange.com/questions/98949/grant-select-on-all-databases-except-one\-mysql (18k views) https://dba.stackexchange.com/questions/68957/block-user-access-to-certain\-tables (13k views) h3. Details: # Users should not be able to see that a DENY is assigned to them. Similar to how databases that the user can not access are not visible in {{show databases}}. # DENY works on roles (as well as PUBLIC when it is implemented) # Enabling a role activates that role's denies as well. # Denies will be visible in {{SHOW GRANTS [FOR]}} if: ** User has read or write access to {{mysql}} database. ** -User has read or write access to corresponding {{mysql}} privilege table.- (TODO for as a separate MDEV for SHOW GRANTS) # (?) Methods of querying denies: INFORMATION_SCHEMA.USER_PRIVILEGES # Introduce a form of SUPER privilege, say IGNORE\_DENIES, to allow a "superuser" to ignore denies (this is compatible with SQL Server DENY behavior) h4. Compatiblity with other databases (Potential future work) *SQL Server* * Compared to SQL Server, DENY can only be revoked via REVOKE DENY. Future possibility for SQL Server compatibility (via {{SQL_MODE=MSSQL}}) GRANT can also cancel a DENY. * An SQL Server quirk is that column level denies take precedence over table level denies. This is a deprecated functionality of SQL Server, meant for backwards compatibility. *MySQL* * MySQL treats revokes as "holes" that are filled when the privilege is granted (directly or via a a higher level grant). Deny will remain in effect in our implementation. * To allow MySQL compatibility, a possible extension in the future is: {{@@partial_revokes=1}} \-> REVOKE also works as DENY. h3. Implementation details: * Current privilege checking order first checks global, database, table, column privileges (in this order). If at any point the needed privileges are met, the privilege checking code stops execution. Introducing denies will require an additional lookup, one for each individual resource accessed. Some form of quick lookup must be made to answer: ** Does this user have denies for databases? (if global privileges met all required access bits). ** Does this user have denies for tables in a particular database (if database level privileges met all required access bits). ** Does this user have denies on table columns for a particular table (if table level privileges met all required access bits). * (?) Should denies be stored in global_priv only, or should corresponding mysql.db, mysql.table_priv, etc. tables also have a "DENY" column? h3. Milestones (each milestone includes test cases showcasing functionality): # Grammar # Global denies # Database denies # Table level denies # Column level denies # Stored procedure denies # Information schema tables |
Status | Stalled [ 10000 ] | In Progress [ 3 ] |
Link |
This issue is blocked by |
Link |
This issue is blocked by |
Assignee | Vicențiu Ciorbaru [ cvicentiu ] | Sergei Golubchik [ serg ] |
Status | In Progress [ 3 ] | In Review [ 10002 ] |
Link |
This issue is blocked by |
Fix Version/s | 10.12 [ 28320 ] | |
Fix Version/s | 10.11 [ 27614 ] |
Summary | Blacklist for access control a.k.a. "negative grants" | DENY list for access control a.k.a. "negative grants" |
Summary | DENY list for access control a.k.a. "negative grants" | DENY clause for access control a.k.a. "negative grants" |
Link | This issue blocks DBAAS-11448 [ DBAAS-11448 ] |
Link | This issue blocks DBAAS-11359 [ DBAAS-11359 ] |
Link | This issue is duplicated by MENT-1655 [ MENT-1655 ] |
Fix Version/s | 11.1 [ 28549 ] | |
Fix Version/s | 11.0 [ 28320 ] |
Assignee | Sergei Golubchik [ serg ] | Oleksandr Byelkin [ sanja ] |
Assignee | Oleksandr Byelkin [ sanja ] | Vicențiu Ciorbaru [ cvicentiu ] |
Fix Version/s | 11.2 [ 28603 ] | |
Fix Version/s | 11.1 [ 28549 ] |
Status | In Review [ 10002 ] | Stalled [ 10000 ] |
Status | Stalled [ 10000 ] | In Progress [ 3 ] |
Fix Version/s | 11.3 [ 28565 ] | |
Fix Version/s | 11.2 [ 28603 ] |
Fix Version/s | 11.4 [ 29301 ] | |
Fix Version/s | 11.3 [ 28565 ] |
Assignee | Vicențiu Ciorbaru [ cvicentiu ] | Julien Fritsch [ julien.fritsch ] |
Status | In Progress [ 3 ] | Stalled [ 10000 ] |
Assignee | Julien Fritsch [ julien.fritsch ] | Vicențiu Ciorbaru [ cvicentiu ] |
Issue Type | Task [ 3 ] | New Feature [ 2 ] |
Fix Version/s | 11.5 [ 29506 ] | |
Fix Version/s | 11.4 [ 29301 ] |
Fix Version/s | 11.6 [ 29515 ] | |
Fix Version/s | 11.5 [ 29506 ] |
Fix Version/s | 11.7 [ 29815 ] | |
Fix Version/s | 11.6 [ 29515 ] |
Labels | gsoc18 | gsoc18 triage |
Zendesk Related Tickets | 120370 202301 |
Fix Version/s | 11.8 [ 29921 ] | |
Fix Version/s | 11.7 [ 29815 ] |
Assignee | Vicențiu Ciorbaru [ cvicentiu ] |
Fix Version/s | 11.9 [ 29945 ] | |
Fix Version/s | 11.8 [ 29921 ] |
Assignee | Vicențiu Ciorbaru [ cvicentiu ] |
Assignee | Vicențiu Ciorbaru [ cvicentiu ] |
Link | This issue blocks MENT-1348 [ MENT-1348 ] |
Assignee | Alexander Barkov [ bar ] |
Assignee | Alexander Barkov [ bar ] | Vladislav Vaintroub [ wlad ] |
Labels | gsoc18 triage | gsoc18 |
Fix Version/s | 12.1 [ 29992 ] | |
Fix Version/s | 12.0 [ 29945 ] |
cvicentiu, rutuja, Please add a rough estimate for the remaining work